A hierarchical security architecture for cyber-physical systems

Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

[1]  T. Başar,et al.  Dynamic Noncooperative Game Theory , 1982 .

[2]  Theodore J. Williams,et al.  A Reference Model for Computer Integrated Manufacturing from the Viewpoint of Industrial Automation , 1990 .

[3]  T. Başar,et al.  Dynamic Noncooperative Game Theory, 2nd Edition , 1998 .

[4]  Michael A. Johnson,et al.  Supervisory Control and Data Acquisition (SCADA) Systems , 1999 .

[5]  Khosrow Moslehi,et al.  Power System Control Centers: Past, Present, and Future , 2005, Proceedings of the IEEE.

[6]  Lun Li,et al.  Cross-layer optimization in TCP/IP networks , 2005, IEEE/ACM Transactions on Networking.

[7]  Marija D. Ilic,et al.  From Hierarchical to Open Access Electric Power Systems , 2007, Proceedings of the IEEE.

[8]  James S. Thorp,et al.  Computer Relaying for Power Systems , 2009 .

[9]  Quanyan Zhu,et al.  Hierarchical Network Formation Games in the Uplink of Multi-Hop Wireless Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[10]  David I. Gertman,et al.  Resilient control systems: Next generation design research , 2009, 2009 2nd Conference on Human System Interactions.

[11]  Kun Ji,et al.  Resilient industrial control system (RICS): Concepts, formulation, metrics, and insights , 2010, 2010 3rd International Symposium on Resilient Control Systems.

[12]  Samuel Greengard,et al.  The new face of war , 2010, Commun. ACM.

[13]  Craig G. Rieger Notional examples and benchmark aspects of a resilient control system , 2010, 2010 3rd International Symposium on Resilient Control Systems.

[14]  Mohsen Jafari,et al.  An integrated security system of protecting Smart Grid against cyber attacks , 2010, 2010 Innovative Smart Grid Technologies (ISGT).

[15]  Khosrow Moslehi,et al.  Smart Grid - a reliability perspective , 2010, 2010 Innovative Smart Grid Technologies (ISGT).

[16]  Raghunathan Rengaswamy,et al.  Achieving resilience in critical infrastructures: A case study for a nuclear power plant cooling loop , 2010, 2010 3rd International Symposium on Resilient Control Systems.

[17]  Tamer Basar,et al.  Graph-theoretic approach for connectivity maintenance in mobile networks in the presence of a jammer , 2010, 49th IEEE Conference on Decision and Control (CDC).

[18]  Sourabh Bhattacharya,et al.  Differential Game-Theoretic Approach to a Spatial Jamming Problem , 2013 .

[19]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.